This book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
اقرأ المزيد
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
اقرأ المزيد
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
اقرأ المزيد
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
اقرأ المزيد
This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...
اقرأ المزيد
This book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...
اقرأ المزيد
This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social ...
اقرأ المزيد
This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
اقرأ المزيد
This volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), ...
اقرأ المزيد
This book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.
اقرأ المزيد
Information systems can be complex due to numerous factors including scale, decentralization, heterogeneity, mobility, dynamism, ...
اقرأ المزيد
Current middleware solutions, such as application servers and Web services, are very complex software products that are hard ...
اقرأ المزيد
The book cover topics such as semantic analysis and multimedia, semantic retrieval and multimedia, semantic metadata management ...
اقرأ المزيد
This book introduces advanced concepts in service provisioning and service engineering, including semantic concepts, dynamic ...
اقرأ المزيد
This book provides a well-paced introduction to the Semantic Web, which is gaining in understanding and acceptance as new ...
اقرأ المزيد
Semiconductor Modeling: For Simulating Signal, Power, and Electromagnetic Integrity gives designers and engineers a broad ...
اقرأ المزيد
Every developer who previously worked with C++ will enjoy the in-depth chapter on important changes in the language from ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the Second International Service Availability Symposium, ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the Third International Service Availability Symposium, ...
اقرأ المزيد